Skip to main content

previous disabled Page of 56
and
Your search also matched 12,932 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Versetzungsanordnungen in α-Messing

Include preview-only content
  1. Chapter and Conference Paper

    Occluded objects recognition using multiscale features and Hopfield neural networks

    A new method to recognize partially visible two-dimensional objects by means of multiscale features and Hopfield neural network is proposed. The Hopfield network is employed to perform global feature matching....

    Jiann-Shu Lee, Chin-Hsing Chen, Yung-Nien Sun in Image Analysis and Processing (1995)

  2. Chapter and Conference Paper

    Texture feature coding method for classification of liver sonography

    Liver sonography is a widely used noninvasive diagnostic tool. Analyzing histology changes in sonograms provides a means of diagnosing and monitoring chronic liver diseases. Nonetheless, conventional ultrasono...

    Ming-Huwi Horng, Yung-Nien Sun, **-Zhang Lin in Computer Vision — ECCV '96 (1996)

  3. Chapter and Conference Paper

    Effective representation of aliases and indirect memory operations in SSA form

    This paper addresses the problems of representing aliases and indirect memory operations in SSA form. We propose a method that prevents explosion in the number of SSA variable versions in the presence of alias...

    Fred Chow, Sun Chan, Shin -Ming Liu, Raymond Lo, Mark Streich in Compiler Construction (1996)

  4. Chapter and Conference Paper

    Aggregate operation movement: A min-cut approach to global code motion

    This paper describes a novel alternative to trace scheduling and other global scheduling techniques that attempt to boost instruction level parallelism by moving operations beyond basic block boundaries. We qu...

    Raymond Lo, Sun Chan, Jim Dehnert, Ross Towle in Euro-Par'96 Parallel Processing (1996)

  5. Chapter and Conference Paper

    COP: A new method for extracting edges and corners

    This paper presents a new, simple and effective low level processing method to obtain features such as edges and corners. In both edge and corner extraction algorithms, we use two oriented cross operators call...

    Sun Cheol Bae, In So Kweon in Image Analysis and Processing (1997)

  6. Chapter and Conference Paper

    On the security of some variants of the RSA signature scheme

    We describe adaptive attacks on several variants of the RSA signature scheme by de Jonge and Chaum. Moreover, we show how to break Boyd’s scheme with an adaptive, a directed and a known signature attack. The f...

    Markus Michels, Markus Stadler, Hung -Min Sun in Computer Security — ESORICS 98 (1998)

  7. Chapter and Conference Paper

    Improving the Security of the McEliece Public-Key Cryptosystem

    At Crypt’97, Berson showed that the McEliece public-key cryptosystem suffers from two weaknesses: (1) failure to protect any message which is encrypted more than once, (2) failure to protect any messages which...

    Hung -Min Sun in Advances in Cryptology — ASIACRYPT’98 (1998)

  8. Chapter and Conference Paper

    Dense 2D displacement reconstruction from SPAMM-MRI with constrained elastic splines: Implementation and validation

    Efficient constrained thin-plate spline warps are proposed in this paper which can warp an area in the plane such that two embedded snake grids obtained from two SPAMM frames are brought into registration, int...

    Amir A. Amini, Yasheng Chen, Jean Sun in Medical Image Computing and Computer-Assis… (1998)

  9. Chapter and Conference Paper

    Global cache management for multi-class workloads in data warehouses

    Data warehouses usually rely on the underlying database management systems, and operations in warehouses require adequate global cache management for both base data and derived sets. However, a problem is how ...

    Shudong **, **aowei Sun in Advanced Information Systems Engineering (1998)

  10. Chapter and Conference Paper

    Efficient Mining of High Confidence Association Rules without Support Thresholds

    Association rules describe the degree of dependence between items in transactional datasets by their confidences. In this paper, we first introduce the problem of mining top rules, namely those association rules ...

    **yan Li, **uzhen Zhang, Guozhu Dong in Principles of Data Mining and Knowledge Di… (1999)

  11. Chapter and Conference Paper

    Scheduling System Verification

    A formal framework is proposed for the verification of complex realtime systems, modeled as client-server scheduling systems, using the popular model-checking approach. Model-checking is often restricted by th...

    Pao-Ann Hsiung, Farn Wang, Yue-Sun Kuo in Tools and Algorithms for the Construction … (1999)

  12. Chapter and Conference Paper

    On the Design of RSA with Short Secret Exponent

    At Eurocrypt’99, Boneh and Durfee presented a new short secret exponent attack which improves Wiener’s bound (d < N 0.25) up to d < N 0.292. In this paper we show that it is possib...

    Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih in Advances in Cryptology - ASIACRYPT’99 (1999)

  13. Chapter and Conference Paper

    A Statistical-Empirical Hybrid Approach to Hierarchical Memory Analysis

    A hybrid approach that utilizes both statistical techniques and empirical methods seeks to provide more information about the performance of an application. In this paper, we present a general approach to crea...

    **an-He Sun, Kirk W. Cameron in Euro-Par 2000 Parallel Processing (2000)

  14. Chapter and Conference Paper

    A Simple and Efficient Approach to Verifying Cryptographic Protocols

    It is necessary to development the formal tools for verifying cryptographic protocols because of the subtlety of cryptographic protocols flaws; In terms of the notions of restrictive channel and equivalent mes...

    Yong**ng Sun, **nmei Wang in Information Security for Global Information Infrastructures (2000)

  15. Chapter and Conference Paper

    A New Approximation Method of the Quadratic Discriminant Function

    For many statistical pattern recognition methods, distributions of sample vectors are assumed to be normal, and the quadratic discriminant function derived from the probability density function of multivariate...

    Shin’ichiro Omachi, Fang Sun, Hirotomo Aso in Advances in Pattern Recognition (2000)

  16. Chapter and Conference Paper

    Fast Implementation of Elliptic Curve Arithmetic in GF(p n )

    Elliptic curve cryptosystems have attracted much attention in recent years and one of major interests in ECC is to develop fast algorithms for field/elliptic curve arithmetic. In this paper we present various ...

    Chae Hoon Lim, Hyo Sun Hwang in Public Key Cryptography (2000)

  17. Chapter and Conference Paper

    A Simplified Field-of-View Calibration Technique for an Operating Microscope

    We present a simplified camera calibration algorithm taking advantage of the geometry of our operating microscope, and requiring no special calibration target. Simulations showed that this algorithm is moderat...

    A. Hartov, H. Sun, D. W. Roberts in Medical Image Computing and Computer-Assis… (2001)

  18. Chapter and Conference Paper

    A Fuzzy Load Balancing Service for Network Computing Based on **i

    Distributed object computing systems are widely envisioned to be the desired distributed software development paradigm due to the higher modularity and the capability of handling machine and operating system h...

    Lap-Sun Cheung, Yu-Kwong Kwok in Euro-Par 2001 Parallel Processing (2001)

  19. Chapter and Conference Paper

    Technologies for Augmented Reality: Calibration for Real-Time Superimposition on Rigid and Simple-Deformable Real Objects

    A current challenge in augmented reality applications is the ability to superimpose synthetic objects on real objects within the environment. This challenge is heightened when the real objects are in motion an...

    Yann Argotti, Valerie Outters, Larry Davis in Medical Image Computing and Computer-Assis… (2001)

  20. Chapter and Conference Paper

    A Quantitative Comparison of Edges in 3D Intraoperative Ultrasound and Preoperative MR Images of the Brain

    The displacement of brain tissue during neurosurgery is a significant source of error for image-guidance systems. We are investigating the use of a computational model to predict brain shift and warp preoperat...

    Karen E. Lunn, Alex Hartov, Eric W. Hansen in Medical Image Computing and Computer-Assis… (2001)

previous disabled Page of 56